Image encryption method based on RNA and pixel depth

A technology of pixel depth and encryption method, which is applied in image communication, secure communication through chaotic signals, and key distribution, can solve the problems of low security performance, cannot apply images of different pixel depths, and has no universality, and achieves protection security. security, enhance the encryption effect, the effect of the security encryption effect

Inactive Publication Date: 2021-11-05
CHINA UNIV OF MINING & TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Purpose of the present invention: for most current image encryption algorithms do not have universal applicability, can not be applied to images of different pixel depths, can not achieve a Figure 1 encryption, one-time pad, and low security performance, an image encryption method based on RNA and pixel depth is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on RNA and pixel depth
  • Image encryption method based on RNA and pixel depth
  • Image encryption method based on RNA and pixel depth

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0065] Figure 5 is the encryption flowchart of this method.

[0066] The programming software used is Matlab R2016a, select Figure 6 The 8BPP (BitPer Pixel) Lena grayscale image with a size of 512×512 is used as the experimental object.

[0067] Step 1: Using SHA-256, calculate the hash value of the plaintext image and the current system time respectively H 1 and H 2 ;Will H 1 and H 2 Take the first 128 bits and integrate them into a hash code with a length of 256 bits H =9390454675d1f5e55b046d30f05

[0068] a8ea1532c6b269a303ac19d3d0a906bb5e250; combined with selected x ' 0 =0.9865, y ' 0 =1.4335, z ' 0 =1.4977, u ' 0= 0.5501, v ' 0 =2.5159, w ' 0 =1.3714, mu ’ =1.6686, e ' =0.2759, t ' =2.5568, according to formula (3)-(5), calculate the initial value of two-dimensional ILASM and four-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on RNA and pixel depth, and belongs to the field of information encryption. At present, the network transmission security problem is increasingly severe, and in order to protect network interaction image content, the invention provides an image encryption method based on RNA and pixel depth. The method comprises the following steps: firstly layering a plaintext image and then carrying out RNA coding; secondly, scrambling the layered RNA image by using a chaos sequence, and performing three-dimensional adaptive Arnold transformation and RNA decoding on a scrambling result to obtain a scrambled image; thirdly, carrying out RNA coding on the scrambled image; using the selected RNA chaos matrix and the scrambled RNA image for diffusion through an RNA operator; and finally, performing RNA decoding on the diffusion result to obtain a final ciphertext image. Experimental results show that the method is wide in application range, good in encryption effect, high in safety and capable of guaranteeing safe and reliable transmission of images under a network platform.

Description

technical field [0001] The method relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] With the development of network technology, great changes have taken place in communication methods. A large number of digital images are transmitted through the network. However, the openness of the network system and the defects of the network protocol make image information leakage incidents occur from time to time. Based on this, the researchers We have proposed a variety of image encryption methods. At present, there are problems such as weak encryption security or low efficiency in these methods; combined with RNA theory, two-dimensional improved logistic-adjusted-sine map (Improved Logistic-Adjusted-SineMap, ILASM) chaos, In order to improve the security and efficiency of the image encryption method and ensure the safe and efficient transmission of image content, technologies such as pixel depth and four-dimensio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44H04L9/00H04L9/08
CPCH04N1/44H04L9/001H04L9/0861
Inventor 张晓强闫轩岗
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products